Operations | Monitoring | ITSM | DevOps | Cloud

Live PostgreSQL Monitoring on Azure & AWS with pgNow

Managing credentials gets trickier as your Flyway project grows, especially when databases contain sensitive data. In this episode, Tony and Tonie break down how Flyway’s Property Resolvers help you keep secrets safe by pulling them securely from local or cloud-based stores, avoiding hardcoding them into config files.

Git Shortlog: Who Really Wrote the Code?

Wondering who’s actually writing the code on your team? Git knows and it’s not subtle. In this episode of Wait… Git Can Do That?, we show you how git shortlog -sne breaks down commit counts by contributor. See who’s active, who’s dropped off Sort by name, email, and commit count Bonus: GitKraken Desktop shows this visually with diffs, additions, and deletions Useful for standups, retros, or just flexing.

Easily Ensure Security Compliance with Puppet Enterprise

Learn how Puppet Enterprise simplifies security compliance management, helping regulated enterprises strengthen their security posture through automated monitoring and actionable insights. Key Features and Benefits: Upgrade your compliance workflow today! Streamline your processes and gain confidence in your security operations with Puppet Enterprise.

AI-Driven Alert Correlation with EventiQ in Splunk ITSI

In this video, we introduce EventiQ in Splunk ITSI, a powerful AI-driven solution designed to cut through the noise and help you find the root cause of issues faster. We’ll show you how EventiQ automatically analyzes and groups related alerts into actionable episodes, significantly reducing alert volume. We’ll cover how to enable EventiQ for a Notable Event Aggregation Policy and review the resulting episodes that it creates.

Enhancing Vulnerability Management Through Exposure Management

Exposure management improves vulnerability management by integrating various attack surfaces and enhancing asset visibility. It promotes a proactive approach to continuously manage threats and exposures. Organizations define their risk appetite for quicker decision-making on vulnerabilities. A zero day response strategy enables swift action on critical vulnerabilities. Ivanti's approach includes strong asset discovery and prioritization, utilizing threat intelligence for effective risk management.